Documentation for Seattle Testbed (scroll down for README)
☆20Jan 22, 2024Updated 2 years ago
Alternatives and similar repositories for r2py-assignment-docs
Users that are interested in r2py-assignment-docs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool combining DWARF info and source to search for kernel heap objects☆25Dec 23, 2025Updated 3 months ago
- ☆21Apr 6, 2025Updated 11 months ago
- ☆13Dec 14, 2021Updated 4 years ago
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆15Mar 25, 2017Updated 9 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- Website that allows everyone to dive into the raw data behind weather predictions☆18Aug 13, 2024Updated last year
- 一个将 vmnote 指令集重编译成 x64 指令集的脚本,并且可以用 IDA 进行分析。☆17Jul 12, 2021Updated 4 years ago
- ☆17Aug 26, 2024Updated last year
- The CTF challenges that I made☆18Mar 31, 2023Updated 2 years ago
- A lightweight library for secure multi-party computation (MPC) based on the GMW protocol, fully written in C#.☆12May 5, 2024Updated last year
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆48Jan 22, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Add debugging tools to an existing initramfs, even if it is for a foreign architecture☆24Aug 28, 2024Updated last year
- ☆16Feb 27, 2026Updated 3 weeks ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 3 months ago
- CTF-PWN LEARNING MATERIALS☆22Jun 25, 2024Updated last year
- Crystal Palace library for proxying Nt API calls via the Threadpool. Updated for call gadgets.☆20Nov 11, 2025Updated 4 months ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 4 months ago
- ☆17May 22, 2024Updated last year
- A VPN written in Rust☆13Apr 17, 2025Updated 11 months ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆28Aug 26, 2025Updated 6 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 11 months ago
- keystone-engine bindings python. support Xcode10 compilation in Mojave. targets for ida macOS☆29Oct 24, 2021Updated 4 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- ☆12Aug 5, 2021Updated 4 years ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 9 months ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Feb 15, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆14Oct 21, 2024Updated last year
- Pointer analysis prototype (currently including anderson, steensgard).☆16Dec 20, 2021Updated 4 years ago
- An example of an external LLVM plugin module transform pass for the latest versions.☆14Oct 21, 2025Updated 5 months ago
- Historical copy of the base applications module of KDE 1, adapted to compile on modern systems (circa. 2016)☆35Jan 10, 2022Updated 4 years ago
- Shellcode, reports of Amazon Echo, which we have presented on Defcon26☆39Aug 12, 2018Updated 7 years ago
- Web File Manager☆11Aug 21, 2025Updated 7 months ago
- ☆29Mar 29, 2023Updated 2 years ago